Nessus Report

Nessus Scan Report

Wed, 12 Apr 2017 01:00:14 W. Europe Standard Time

Table Of Contents
Vulnerabilities By Host
192.168.109.5
192.168.109.20
192.168.109.21
192.168.109.22
192.168.109.23
192.168.109.201
10.1.1.1
10.1.1.11
10.1.1.13
10.1.1.15
10.1.1.112
10.1.1.114
10.1.1.115
10.1.1.120
Remediations
Suggested Remediations

Vulnerabilities By Host

[-] Collapse All
[+] Expand All

192.168.109.5

Scan Information

Start time: Wed Apr 12 01:03:31 2017
End time: Wed Apr 12 01:04:40 2017

Host Information

OS: HP Switch

Results Summary

Critical High Medium Low Info Total
0 0 0 0 8 8

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

23/tcp

14274 - Nessus SNMP Scanner [-/+]

69/udp

14274 - Nessus SNMP Scanner [-/+]

80/tcp

14274 - Nessus SNMP Scanner [-/+]

161/udp

14274 - Nessus SNMP Scanner [-/+]

1506/tcp

14274 - Nessus SNMP Scanner [-/+]

1507/udp

14274 - Nessus SNMP Scanner [-/+]

1513/tcp

14274 - Nessus SNMP Scanner [-/+]

192.168.109.20

Scan Information

Start time: Wed Apr 12 01:00:27 2017
End time: Wed Apr 12 01:09:28 2017

Host Information

OS: Linux Kernel 3.10.0-327.10.1.el7.x86_64 on Red Hat Enterprise Linux Server release 7.1 (Maipo)

Results Summary

Critical High Medium Low Info Total
12 30 34 2 61 139

Results Details

0/tcp

14657 - Red Hat Update Level [-/+]

89774 - RHEL 5 / 6 / 7 : firefox (RHSA-2016:0373) [-/+]

90615 - RHEL 7 : java-1.8.0-openjdk (RHSA-2016:0650) [-/+]

90669 - RHEL 5 / 7 : java-1.7.0-openjdk (RHSA-2016:0676) [-/+]

91033 - RHEL 7 : openssl (RHSA-2016:0722) [-/+]

91036 - RHEL 6 / 7 : ImageMagick (RHSA-2016:0726) (ImageTragick) [-/+]

91642 - RHEL 6 / 7 : ImageMagick (RHSA-2016:1237) [-/+]

91802 - RHEL 6 / 7 : libxml2 (RHSA-2016:1292) [-/+]

94537 - RHEL 7 : kernel (RHSA-2016:2574) [-/+]

94549 - RHEL 7 : python (RHSA-2016:2586) [-/+]

94558 - RHEL 7 : mariadb (RHSA-2016:2595) [-/+]

96593 - RHEL 7 : kernel (RHSA-2017:0086) [-/+]

90180 - RHEL 5 / 7 : java-1.7.0-openjdk (RHSA-2016:0512) [-/+]

90181 - RHEL 7 : java-1.8.0-openjdk (RHSA-2016:0513) [-/+]

90300 - RHEL 7 : mariadb (RHSA-2016:0534) [-/+]

90387 - RHEL 7 : graphite2 (RHSA-2016:0594) [-/+]

90749 - RHEL 7 : nss, nspr, nss-softokn, and nss-util (RHSA-2016:0685) [-/+]

91078 - RHEL 7 : pcre (RHSA-2016:1025) [-/+]

91114 - RHEL 7 : kernel (RHSA-2016:1033) [-/+]

91801 - RHEL 7 : kernel (RHSA-2016:1277) [-/+]

92490 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2016:1458) [-/+]

92604 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2016:1504) [-/+]

92694 - RHEL 7 : kernel (RHSA-2016:1539) [-/+]

92696 - RHEL 7 : libtiff (RHSA-2016:1546) [-/+]

93555 - RHEL 7 : kernel (RHSA-2016:1847) [-/+]

93763 - RHEL 6 / 7 : openssl (RHSA-2016:1940) [-/+]

93784 - RHEL 5 / 6 / 7 : bind (RHSA-2016:1944) [-/+]

93952 - RHEL 7 : kernel (RHSA-2016:2047) [-/+]

94150 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2016:2079) [-/+]

94230 - RHEL 7 : kernel (RHSA-2016:2098) (Dirty COW) [-/+]

94545 - RHEL 7 : nettle (RHSA-2016:2582) [-/+]

94551 - RHEL 7 : openssh (RHSA-2016:2588) [-/+]

94553 - RHEL 7 : dhcp (RHSA-2016:2590) [-/+]

94623 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2016:2658) [-/+]

94896 - RHEL 6 / 7 : policycoreutils (RHSA-2016:2702) [-/+]

94912 - RHEL 5 / 6 / 7 : nss and nss-util (RHSA-2016:2779) [-/+]

95381 - RHEL 6 / 7 : expat (RHSA-2016:2824) [-/+]

96948 - RHEL 6 / 7 : libtiff (RHSA-2017:0225) [-/+]

97011 - RHEL 6 / 7 : ntp (RHSA-2017:0252) [-/+]

97349 - RHEL 7 : kernel (RHSA-2017:0294) [-/+]

97509 - RHEL 7 : kernel (RHSA-2017:0386) [-/+]

97769 - RHEL 7 : policycoreutils (RHSA-2017:0536) [-/+]

89771 - RHEL 6 / 7 : nss-util (RHSA-2016:0370) [-/+]

89820 - RHEL 6 / 7 : libssh2 (RHSA-2016:0428) [-/+]

89954 - RHEL 6 / 7 : samba (RHSA-2016:0448) [-/+]

89985 - RHEL 5 / 6 / 7 : bind (RHSA-2016:0459) [-/+]

90078 - RHEL 7 : openssh (RHSA-2016:0465) [-/+]

90140 - RHEL 6 / 7 : nss-util (RHSA-2016:0495) [-/+]

90299 - RHEL 7 : krb5 (RHSA-2016:0532) [-/+]

90492 - RHEL 6 / 7 : samba and samba4 (RHSA-2016:0612) (Badlock) [-/+]

90495 - RHEL 7 : samba (RHSA-2016:0618) (Badlock) [-/+]

91214 - RHEL 7 : libndp (RHSA-2016:1086) [-/+]

91420 - RHEL 6 / 7 : ntp (RHSA-2016:1141) [-/+]

92579 - RHEL 7 : samba (RHSA-2016:1486) [-/+]

92938 - RHEL 7 : mariadb (RHSA-2016:1602) [-/+]

93039 - RHEL 6 / 7 : python (RHSA-2016:1626) (httpoxy) [-/+]

93042 - RHEL 7 : kernel (RHSA-2016:1633) [-/+]

94536 - RHEL 7 : glibc (RHSA-2016:2573) [-/+]

94538 - RHEL 7 : curl (RHSA-2016:2575) [-/+]

94546 - RHEL 7 : ntp (RHSA-2016:2583) [-/+]

94550 - RHEL 7 : wget (RHSA-2016:2587) [-/+]

94554 - RHEL 7 : krb5 (RHSA-2016:2591) [-/+]

94556 - RHEL 7 : sudo (RHSA-2016:2593) [-/+]

94564 - RHEL 7 : fontconfig (RHSA-2016:2601) [-/+]

94568 - RHEL 7 : util-linux (RHSA-2016:2605) [-/+]

94603 - RHEL 7 : systemd (RHSA-2016:2610) [-/+]

94605 - RHEL 7 : bind (RHSA-2016:2615) [-/+]

94626 - RHEL 6 / 7 : libgcrypt (RHSA-2016:2674) [-/+]

95600 - RHEL 6 / 7 : sudo (RHSA-2016:2872) [-/+]

95983 - RHEL 6 / 7 : vim (RHSA-2016:2972) [-/+]

96308 - RHEL 7 : ghostscript (RHSA-2017:0013) [-/+]

96523 - RHEL 7 : bind (RHSA-2017:0062) [-/+]

96693 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2017:0180) [-/+]

97121 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2017:0269) [-/+]

97200 - RHEL 7 : bind (RHSA-2017:0276) [-/+]

97294 - RHEL 6 / 7 : openssl (RHSA-2017:0286) [-/+]

94544 - RHEL 7 : NetworkManager (RHSA-2016:2581) [-/+]

94555 - RHEL 7 : subscription-manager (RHSA-2016:2592) [-/+]

12634 - Authenticated Check : OS Name and Installed Package Enumeration [-/+]

19506 - Nessus Scan Information [-/+]

66334 - Patch Report [-/+]

22/tcp

14272 - netstat portscanner (SSH) [-/+]

88/tcp

14272 - netstat portscanner (SSH) [-/+]

111/udp

14272 - netstat portscanner (SSH) [-/+]

161/udp

14272 - netstat portscanner (SSH) [-/+]

389/tcp

14272 - netstat portscanner (SSH) [-/+]

749/tcp

14272 - netstat portscanner (SSH) [-/+]

1005/udp

14272 - netstat portscanner (SSH) [-/+]

2222/tcp

14272 - netstat portscanner (SSH) [-/+]

2225/tcp

14272 - netstat portscanner (SSH) [-/+]

2233/tcp

14272 - netstat portscanner (SSH) [-/+]

2236/tcp

14272 - netstat portscanner (SSH) [-/+]

2241/tcp

14272 - netstat portscanner (SSH) [-/+]

2242/tcp

14272 - netstat portscanner (SSH) [-/+]

3338/tcp

14272 - netstat portscanner (SSH) [-/+]

4357/tcp

14272 - netstat portscanner (SSH) [-/+]

4359/tcp

14272 - netstat portscanner (SSH) [-/+]

6201/tcp

14272 - netstat portscanner (SSH) [-/+]

6202/tcp

14272 - netstat portscanner (SSH) [-/+]

6203/tcp

14272 - netstat portscanner (SSH) [-/+]

6204/udp

14272 - netstat portscanner (SSH) [-/+]

6205/tcp

14272 - netstat portscanner (SSH) [-/+]

6206/tcp

14272 - netstat portscanner (SSH) [-/+]

6207/tcp

14272 - netstat portscanner (SSH) [-/+]

6209/udp

14272 - netstat portscanner (SSH) [-/+]

6224/tcp

14272 - netstat portscanner (SSH) [-/+]

6225/tcp

14272 - netstat portscanner (SSH) [-/+]

6226/tcp

14272 - netstat portscanner (SSH) [-/+]

6227/tcp

14272 - netstat portscanner (SSH) [-/+]

6228/tcp

14272 - netstat portscanner (SSH) [-/+]

6229/tcp

14272 - netstat portscanner (SSH) [-/+]

6230/tcp

14272 - netstat portscanner (SSH) [-/+]

6231/tcp

14272 - netstat portscanner (SSH) [-/+]

6232/tcp

14272 - netstat portscanner (SSH) [-/+]

6233/tcp

14272 - netstat portscanner (SSH) [-/+]

6249/tcp

14272 - netstat portscanner (SSH) [-/+]

6250/tcp

14272 - netstat portscanner (SSH) [-/+]

6252/tcp

14272 - netstat portscanner (SSH) [-/+]

6255/tcp

14272 - netstat portscanner (SSH) [-/+]

6258/tcp

14272 - netstat portscanner (SSH) [-/+]

6260/tcp

14272 - netstat portscanner (SSH) [-/+]

6262/tcp

14272 - netstat portscanner (SSH) [-/+]

6263/tcp

14272 - netstat portscanner (SSH) [-/+]

6265/tcp

14272 - netstat portscanner (SSH) [-/+]

6266/tcp

14272 - netstat portscanner (SSH) [-/+]

6406/tcp

14272 - netstat portscanner (SSH) [-/+]

6407/tcp

14272 - netstat portscanner (SSH) [-/+]

49360/udp

14272 - netstat portscanner (SSH) [-/+]

50457/udp

14272 - netstat portscanner (SSH) [-/+]

53934/tcp

14272 - netstat portscanner (SSH) [-/+]

54419/udp

14272 - netstat portscanner (SSH) [-/+]

54763/udp

14272 - netstat portscanner (SSH) [-/+]

56238/udp

14272 - netstat portscanner (SSH) [-/+]

59275/udp

14272 - netstat portscanner (SSH) [-/+]

59905/udp

14272 - netstat portscanner (SSH) [-/+]

63706/udp

14272 - netstat portscanner (SSH) [-/+]

64812/udp

14272 - netstat portscanner (SSH) [-/+]

64886/udp

14272 - netstat portscanner (SSH) [-/+]

65190/udp

14272 - netstat portscanner (SSH) [-/+]

192.168.109.21

Scan Information

Start time: Wed Apr 12 01:00:39 2017
End time: Wed Apr 12 01:13:42 2017

Host Information

DNS Name: bldad01
Netbios Name: BLDAD01
IP: 192.168.109.21
MAC Address: 00:0C:29:C9:6C:C7
OS: Microsoft Windows Server 2012 R2 Standard

Results Summary

Critical High Medium Low Info Total
5 61 15 3 146 230

Results Details

0/tcp

10897 - Microsoft Windows - Users Information : Disabled Accounts [-/+]

10898 - Microsoft Windows - Users Information : Never Changed Password [-/+]

10899 - Microsoft Windows - Users Information : User Has Never Logged In [-/+]

10900 - Microsoft Windows - Users Information : Passwords Never Expire [-/+]

10908 - Microsoft Windows 'Domain Administrators' Group User List [-/+]

10913 - Microsoft Windows - Local Users Information : Disabled Accounts [-/+]

10914 - Microsoft Windows - Local Users Information : Never Changed Passwords [-/+]

10915 - Microsoft Windows - Local Users Information : User Has Never Logged In [-/+]

10916 - Microsoft Windows - Local Users Information : Passwords Never Expire [-/+]

19506 - Nessus Scan Information [-/+]

24269 - Windows Management Instrumentation (WMI) Available [-/+]

24270 - Computer Manufacturer Information (WMI) [-/+]

24272 - Network Interfaces Enumeration (WMI) [-/+]

34096 - BIOS Version (WMI) [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

38153 - Microsoft Windows Summary of Missing Patches [-/+]

44871 - WMI Windows Feature Enumeration [-/+]

48337 - Windows ComputerSystemProduct Enumeration (WMI) [-/+]

52001 - WMI QuickFixEngineering (QFE) Enumeration [-/+]

57364 - PuTTY Detection [-/+]

62042 - SMB QuickFixEngineering (QFE) Enumeration [-/+]

66334 - Patch Report [-/+]

70329 - Microsoft Windows Process Information [-/+]

70331 - Microsoft Windows Process Module Information [-/+]

71246 - Enumerate Local Group Memberships [-/+]

72482 - Windows Display Driver Enumeration [-/+]

53/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

67/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

68/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

88/tcp

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

88/udp

34220 - Netstat Portscanner (WMI) [-/+]

123/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

135/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

137/udp

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

138/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

139/tcp

11011 - Microsoft Windows SMB Service Detection [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

161/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

389/tcp

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

389/udp

34220 - Netstat Portscanner (WMI) [-/+]

445/tcp

91599 - MS16-071: Security Update for Microsoft Windows DNS Server (3164065) [-/+]

91605 - MS16-077: Security Update for WPAD (3165191) [-/+]

97737 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) [-/+]

97743 - MS17-012: Security Update for Microsoft Windows (4013078) [-/+]

97833 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) (uncredentialed check) [-/+]

53382 - MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution (2500212) [-/+]

81264 - MS15-011: Vulnerability in Group Policy Could Allow Remote Code Execution (3000483) [-/+]

87253 - MS15-124: Cumulative Security Update for Internet Explorer (3116180) [-/+]

90431 - MS16-037: Cumulative Security Update for Internet Explorer (3148531) [-/+]

90433 - MS16-039: Security Update for Microsoft Graphics Component (3148522) [-/+]

90434 - MS16-040: Security Update for Microsoft XML Core Services (3148541) [-/+]

90437 - MS16-044: Security Update for Windows OLE (3146706) [-/+]

90441 - MS16-048: Security Update for CSRSS (3148528) [-/+]

91001 - MS16-051: Cumulative Security Update for Internet Explorer (3155533) [-/+]

91005 - MS16-055: Security Update for Microsoft Graphics Component (3156754) [-/+]

91007 - MS16-057: Security Update for Windows Shell (3156987) [-/+]

91010 - MS16-060: Security Update for Windows Kernel (3154846) [-/+]

91011 - MS16-061: Security Update for Microsoft RPC (3155520) [-/+]

91012 - MS16-062: Security Update for Windows Kernel-Mode Drivers (3158222) [-/+]

91596 - MS16-063: Cumulative Security Update for Internet Explorer (3163649) [-/+]

91600 - MS16-072: Security Update for Group Policy (3163622) [-/+]

91601 - MS16-073: Security Update for Windows Kernel-Mode Drivers (3164028) [-/+]

91602 - MS16-074: Security Update for Microsoft Graphics Component (3164036) [-/+]

91603 - MS16-075: Security Update for Windows SMB Server (3164038) [-/+]

91604 - MS16-076: Security Update for Netlogon (3167691) [-/+]

91607 - MS16-080: Security Update for Microsoft Windows PDF (3164302) [-/+]

92015 - MS16-084: Cumulative Security Update for Internet Explorer (3169991) [-/+]

92018 - MS16-087: Security Update for Windows Print Spooler (3170005) [-/+]

92021 - MS16-090: Security Update for Windows Kernel-Mode Drivers (3171481) [-/+]

92023 - MS16-092: Security Update for Windows Kernel (3171910) [-/+]

92025 - MS16-094: Security Update for Secure Boot (3177404) [-/+]

92819 - MS16-095: Cumulative Security Update for Internet Explorer (3177356) [-/+]

92821 - MS16-098: Security Update for Windows Kernel-Mode Drivers (3178466) [-/+]

92822 - MS16-100: Security Update for Secure Boot (3179577) [-/+]

92823 - MS16-101: Security Update for Windows Authentication Methods (3178465) [-/+]

92824 - MS16-102: Security Update for Microsoft Windows PDF Library (3182248) [-/+]

92843 - MS16-097: Security Update for Microsoft Graphics Component (3177393) [-/+]

93464 - MS16-104: Cumulative Security Update for Internet Explorer (3183038) [-/+]

93466 - MS16-106: Security Update for Microsoft Graphics Component (3185848) [-/+]

93469 - MS16-110: Security Update for Microsoft Windows (3178467) [-/+]

93470 - MS16-111: Security Update for Windows Kernel (3186973) [-/+]

93471 - MS16-112: Security Update for Windows Lock Screen (3178469) [-/+]

93473 - MS16-114: Security Update for Windows SMBv1 Server (3185879) [-/+]

93651 - MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724) [-/+]

94011 - MS16-118: Cumulative Security Update for Internet Explorer (3192887) [-/+]

94012 - MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892) [-/+]

94017 - MS16-120: Security Update for Microsoft Graphics Component (3192884) [-/+]

94631 - MS16-130: Security Update for Microsoft Windows (3199172) [-/+]

94633 - MS16-132: Security Update for Microsoft Graphics Component (3199120) [-/+]

94635 - MS16-134: Security Update for Common Log File System Driver (3193706) [-/+]

94636 - MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135) [-/+]

94638 - MS16-137: Security Update for Windows Authentication Methods (3199173) [-/+]

94639 - MS16-138: Security Update for Microsoft Virtual Hard Disk Driver (3199647) [-/+]

94641 - MS16-140: Security Update for Boot Manager (3193479) [-/+]

94643 - MS16-142: Cumulative Security Update for Internet Explorer (3198467) [-/+]

95764 - MS16-144: Cumulative Security Update for Internet Explorer (3204059) [-/+]

95765 - MS16-146: Security Update for Microsoft Graphics Component (3204066) [-/+]

95766 - MS16-147: Security Update for Microsoft Uniscribe (3204063) [-/+]

95768 - MS16-151: Security Update for Windows Kernel-Mode Drivers (3205651) [-/+]

95813 - MS16-149: Security Update for Microsoft Windows (3205655) [-/+]

97729 - MS17-006: Cumulative Security Update for Internet Explorer (4013073) [-/+]

97731 - MS17-009: Security Update for Microsoft Windows PDF Library (4010319) [-/+]

97732 - MS17-011: Security Update for Microsoft Uniscribe (4013076) [-/+]

97733 - MS17-017: Security Update for Windows Kernel (4013081) [-/+]

97738 - MS17-018: Security Update for Windows Kernel-Mode Drivers (4013083) [-/+]

97794 - MS17-013: Security Update for Microsoft Graphics Component (4013075) [-/+]

78447 - MS KB3009008: Vulnerability in SSL 3.0 Could Allow Information Disclosure (POODLE) [-/+]

90440 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) [-/+]

91014 - MS16-065: Security Update for .NET Framework (3156757) [-/+]

91016 - MS16-067: Security Update for Volume Manager Driver (3155784) [-/+]

91045 - MS KB3155527: Update to Cipher Suites for FalseStart [-/+]

91608 - MS16-081: Security Update for Active Directory (3160352) [-/+]

91609 - MS16-082: Security Update for Microsoft Windows Search Component (3165270) [-/+]

92022 - MS16-091: Security Update for .NET Framework (3170048) [-/+]

93474 - MS16-115: Security Update for Microsoft Windows PDF Library (3188733) [-/+]

97736 - MS17-021: Security Update for Windows DirectShow (4010318) [-/+]

97741 - MS17-016: Security Update for Windows IIS (4013074) [-/+]

97742 - MS17-022: Security Update for Microsoft XML Core Services (4010321) [-/+]

11457 - Microsoft Windows SMB Registry : Winlogon Cached Password Weakness [-/+]

94013 - MS16-124: Security Update for Windows Registry (3193227) [-/+]

95770 - MS16-153: Security Update for Common Log File System Driver (3207328) [-/+]

10394 - Microsoft Windows SMB Log In Possible [-/+]

10395 - Microsoft Windows SMB Shares Enumeration [-/+]

10396 - Microsoft Windows SMB Shares Access [-/+]

10398 - Microsoft Windows SMB LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration [-/+]

10399 - SMB Use Domain SID to Enumerate Users [-/+]

10400 - Microsoft Windows SMB Registry Remotely Accessible [-/+]

10413 - Microsoft Windows SMB Registry : Remote PDC/BDC Detection [-/+]

10456 - Microsoft Windows SMB Service Enumeration [-/+]

10736 - DCE Services Enumeration [-/+]

10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure [-/+]

10859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration [-/+]

10860 - SMB Use Host SID to Enumerate Local Users [-/+]

10902 - Microsoft Windows 'Administrators' Group User List [-/+]

11011 - Microsoft Windows SMB Service Detection [-/+]

12028 - Microsoft Windows SMB : WindowsUpdate Disabled [-/+]

17651 - Microsoft Windows SMB : Obtains the Password Policy [-/+]

20811 - Microsoft Windows Installed Software Enumeration (credentialed check) [-/+]

23974 - Microsoft Windows SMB Share Hosting Office Files [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

35730 - Microsoft Windows USB Device Usage Report [-/+]

38689 - Microsoft Windows SMB Last Logged On User Disclosure [-/+]

44401 - Microsoft Windows SMB Service Config Enumeration [-/+]

48942 - Microsoft Windows SMB Registry : OS Version and Processor Architecture [-/+]

51351 - Microsoft .NET Framework Detection [-/+]

57033 - Microsoft Patch Bulletin Feasibility Check [-/+]

58452 - Microsoft Windows Startup Software Enumeration [-/+]

60119 - Microsoft Windows SMB Share Permissions Enumeration [-/+]

63080 - Microsoft Windows Mounted Devices [-/+]

63620 - Windows Product Key Retrieval [-/+]

66424 - Microsoft Malicious Software Removal Tool Installed [-/+]

72367 - Microsoft Internet Explorer Version Detection [-/+]

72879 - Microsoft Internet Explorer Enhanced Security Configuration Detection [-/+]

97086 - Server Message Block (SMB) Protocol Version 1 Enabled [-/+]

464/tcp

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

464/udp

34220 - Netstat Portscanner (WMI) [-/+]

500/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

593/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

636/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

2535/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3268/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3269/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3389/tcp

18405 - Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness [-/+]

10940 - Windows Terminal Services Enabled [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3389/udp

34220 - Netstat Portscanner (WMI) [-/+]

4500/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

5355/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

5985/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

9389/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

47001/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49152/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49153/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49154/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49155/tcp

90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check) [-/+]

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49157/tcp

10761 - COM+ Internet Services (CIS) Server Detection [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49158/tcp

90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check) [-/+]

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49159/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49163/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49164/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49171/tcp

10736 - DCE Services Enumeration [-/+]

49173/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49186/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

192.168.109.22

Scan Information

Start time: Wed Apr 12 01:00:52 2017
End time: Wed Apr 12 01:03:45 2017

Host Information

OS: Linux Kernel 3.10.0-327.10.1.el7.x86_64 on Red Hat Enterprise Linux Server release 7.1 (Maipo)

Results Summary

Critical High Medium Low Info Total
13 39 34 2 16 104

Results Details

0/tcp

14657 - Red Hat Update Level [-/+]

86576 - Oracle Database Multiple Vulnerabilities (October 2015 CPU) [-/+]

89774 - RHEL 5 / 6 / 7 : firefox (RHSA-2016:0373) [-/+]

90615 - RHEL 7 : java-1.8.0-openjdk (RHSA-2016:0650) [-/+]

90669 - RHEL 5 / 7 : java-1.7.0-openjdk (RHSA-2016:0676) [-/+]

91033 - RHEL 7 : openssl (RHSA-2016:0722) [-/+]

91036 - RHEL 6 / 7 : ImageMagick (RHSA-2016:0726) (ImageTragick) [-/+]

91642 - RHEL 6 / 7 : ImageMagick (RHSA-2016:1237) [-/+]

91802 - RHEL 6 / 7 : libxml2 (RHSA-2016:1292) [-/+]

94537 - RHEL 7 : kernel (RHSA-2016:2574) [-/+]

94549 - RHEL 7 : python (RHSA-2016:2586) [-/+]

94558 - RHEL 7 : mariadb (RHSA-2016:2595) [-/+]

96593 - RHEL 7 : kernel (RHSA-2017:0086) [-/+]

78540 - Oracle Database Multiple Vulnerabilities (October 2014 CPU) [-/+]

80906 - Oracle Database Multiple Vulnerabilities (January 2015 CPU) [-/+]

82903 - Oracle Database Multiple Vulnerabilities (April 2015 CPU) [-/+]

84822 - Oracle Database Multiple Vulnerabilities (July 2015 CPU) [-/+]

88146 - Oracle Database Multiple Vulnerabilities (January 2016 CPU) [-/+]

90180 - RHEL 5 / 7 : java-1.7.0-openjdk (RHSA-2016:0512) [-/+]

90181 - RHEL 7 : java-1.8.0-openjdk (RHSA-2016:0513) [-/+]

90300 - RHEL 7 : mariadb (RHSA-2016:0534) [-/+]

90387 - RHEL 7 : graphite2 (RHSA-2016:0594) [-/+]

90749 - RHEL 7 : nss, nspr, nss-softokn, and nss-util (RHSA-2016:0685) [-/+]

90762 - Oracle Database Multiple Vulnerabilities (April 2016 CPU) [-/+]

91078 - RHEL 7 : pcre (RHSA-2016:1025) [-/+]

91114 - RHEL 7 : kernel (RHSA-2016:1033) [-/+]

91801 - RHEL 7 : kernel (RHSA-2016:1277) [-/+]

92490 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2016:1458) [-/+]

92522 - Oracle Database Multiple Vulnerabilities (July 2016 CPU) (FREAK) [-/+]

92604 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2016:1504) [-/+]

92694 - RHEL 7 : kernel (RHSA-2016:1539) [-/+]

92696 - RHEL 7 : libtiff (RHSA-2016:1546) [-/+]

93555 - RHEL 7 : kernel (RHSA-2016:1847) [-/+]

93763 - RHEL 6 / 7 : openssl (RHSA-2016:1940) [-/+]

93784 - RHEL 5 / 6 / 7 : bind (RHSA-2016:1944) [-/+]

93952 - RHEL 7 : kernel (RHSA-2016:2047) [-/+]

94150 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2016:2079) [-/+]

94201 - Oracle Database Multiple Vulnerabilities (October 2016 CPU) [-/+]

94230 - RHEL 7 : kernel (RHSA-2016:2098) (Dirty COW) [-/+]

94545 - RHEL 7 : nettle (RHSA-2016:2582) [-/+]

94551 - RHEL 7 : openssh (RHSA-2016:2588) [-/+]

94553 - RHEL 7 : dhcp (RHSA-2016:2590) [-/+]

94623 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2016:2658) [-/+]

94896 - RHEL 6 / 7 : policycoreutils (RHSA-2016:2702) [-/+]

94912 - RHEL 5 / 6 / 7 : nss and nss-util (RHSA-2016:2779) [-/+]

95381 - RHEL 6 / 7 : expat (RHSA-2016:2824) [-/+]

96611 - Oracle Database Multiple Vulnerabilities (January 2017 CPU) [-/+]

96948 - RHEL 6 / 7 : libtiff (RHSA-2017:0225) [-/+]

97011 - RHEL 6 / 7 : ntp (RHSA-2017:0252) [-/+]

97349 - RHEL 7 : kernel (RHSA-2017:0294) [-/+]

97509 - RHEL 7 : kernel (RHSA-2017:0386) [-/+]

97769 - RHEL 7 : policycoreutils (RHSA-2017:0536) [-/+]

89771 - RHEL 6 / 7 : nss-util (RHSA-2016:0370) [-/+]

89820 - RHEL 6 / 7 : libssh2 (RHSA-2016:0428) [-/+]

89954 - RHEL 6 / 7 : samba (RHSA-2016:0448) [-/+]

89985 - RHEL 5 / 6 / 7 : bind (RHSA-2016:0459) [-/+]

90078 - RHEL 7 : openssh (RHSA-2016:0465) [-/+]

90140 - RHEL 6 / 7 : nss-util (RHSA-2016:0495) [-/+]

90299 - RHEL 7 : krb5 (RHSA-2016:0532) [-/+]

90492 - RHEL 6 / 7 : samba and samba4 (RHSA-2016:0612) (Badlock) [-/+]

90495 - RHEL 7 : samba (RHSA-2016:0618) (Badlock) [-/+]

91214 - RHEL 7 : libndp (RHSA-2016:1086) [-/+]

91420 - RHEL 6 / 7 : ntp (RHSA-2016:1141) [-/+]

92579 - RHEL 7 : samba (RHSA-2016:1486) [-/+]

92938 - RHEL 7 : mariadb (RHSA-2016:1602) [-/+]

93039 - RHEL 6 / 7 : python (RHSA-2016:1626) (httpoxy) [-/+]

93042 - RHEL 7 : kernel (RHSA-2016:1633) [-/+]

94536 - RHEL 7 : glibc (RHSA-2016:2573) [-/+]

94538 - RHEL 7 : curl (RHSA-2016:2575) [-/+]

94546 - RHEL 7 : ntp (RHSA-2016:2583) [-/+]

94550 - RHEL 7 : wget (RHSA-2016:2587) [-/+]

94554 - RHEL 7 : krb5 (RHSA-2016:2591) [-/+]

94556 - RHEL 7 : sudo (RHSA-2016:2593) [-/+]

94564 - RHEL 7 : fontconfig (RHSA-2016:2601) [-/+]

94568 - RHEL 7 : util-linux (RHSA-2016:2605) [-/+]

94603 - RHEL 7 : systemd (RHSA-2016:2610) [-/+]

94605 - RHEL 7 : bind (RHSA-2016:2615) [-/+]

94626 - RHEL 6 / 7 : libgcrypt (RHSA-2016:2674) [-/+]

95600 - RHEL 6 / 7 : sudo (RHSA-2016:2872) [-/+]

95983 - RHEL 6 / 7 : vim (RHSA-2016:2972) [-/+]

96308 - RHEL 7 : ghostscript (RHSA-2017:0013) [-/+]

96523 - RHEL 7 : bind (RHSA-2017:0062) [-/+]

96693 - RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2017:0180) [-/+]

97121 - RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2017:0269) [-/+]

97200 - RHEL 7 : bind (RHSA-2017:0276) [-/+]

97294 - RHEL 6 / 7 : openssl (RHSA-2017:0286) [-/+]

94544 - RHEL 7 : NetworkManager (RHSA-2016:2581) [-/+]

94555 - RHEL 7 : subscription-manager (RHSA-2016:2592) [-/+]

12634 - Authenticated Check : OS Name and Installed Package Enumeration [-/+]

19506 - Nessus Scan Information [-/+]

66334 - Patch Report [-/+]

71644 - Oracle Database Patch Info (credentialed check) [-/+]

22/tcp

14272 - netstat portscanner (SSH) [-/+]

88/tcp

14272 - netstat portscanner (SSH) [-/+]

111/udp

14272 - netstat portscanner (SSH) [-/+]

161/udp

14272 - netstat portscanner (SSH) [-/+]

389/tcp

14272 - netstat portscanner (SSH) [-/+]

749/tcp

14272 - netstat portscanner (SSH) [-/+]

1013/udp

14272 - netstat portscanner (SSH) [-/+]

2233/tcp

14272 - netstat portscanner (SSH) [-/+]

2241/tcp

14272 - netstat portscanner (SSH) [-/+]

2242/tcp

14272 - netstat portscanner (SSH) [-/+]

51426/tcp

14272 - netstat portscanner (SSH) [-/+]

57987/udp

14272 - netstat portscanner (SSH) [-/+]

192.168.109.23

Scan Information

Start time: Wed Apr 12 01:01:04 2017
End time: Wed Apr 12 01:14:20 2017

Host Information

DNS Name: bldde01
Netbios Name: BLDDE01
IP: 192.168.109.23
MAC Address: 00:0C:29:B6:23:1D
OS: Microsoft Windows Server 2012 R2 Standard

Results Summary

Critical High Medium Low Info Total
5 90 15 3 145 258

Results Details

0/tcp

96453 - Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) [-/+]

10897 - Microsoft Windows - Users Information : Disabled Accounts [-/+]

10898 - Microsoft Windows - Users Information : Never Changed Password [-/+]

10899 - Microsoft Windows - Users Information : User Has Never Logged In [-/+]

10900 - Microsoft Windows - Users Information : Passwords Never Expire [-/+]

10913 - Microsoft Windows - Local Users Information : Disabled Accounts [-/+]

10914 - Microsoft Windows - Local Users Information : Never Changed Passwords [-/+]

10915 - Microsoft Windows - Local Users Information : User Has Never Logged In [-/+]

10916 - Microsoft Windows - Local Users Information : Passwords Never Expire [-/+]

19506 - Nessus Scan Information [-/+]

24269 - Windows Management Instrumentation (WMI) Available [-/+]

24270 - Computer Manufacturer Information (WMI) [-/+]

24272 - Network Interfaces Enumeration (WMI) [-/+]

27524 - Microsoft Office Detection [-/+]

34096 - BIOS Version (WMI) [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

38153 - Microsoft Windows Summary of Missing Patches [-/+]

44871 - WMI Windows Feature Enumeration [-/+]

48337 - Windows ComputerSystemProduct Enumeration (WMI) [-/+]

52001 - WMI QuickFixEngineering (QFE) Enumeration [-/+]

57364 - PuTTY Detection [-/+]

62042 - SMB QuickFixEngineering (QFE) Enumeration [-/+]

66334 - Patch Report [-/+]

70329 - Microsoft Windows Process Information [-/+]

70331 - Microsoft Windows Process Module Information [-/+]

71246 - Enumerate Local Group Memberships [-/+]

72482 - Windows Display Driver Enumeration [-/+]

72684 - Enumerate Local Users [-/+]

77605 - Microsoft OneNote Detection [-/+]

123/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

135/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

137/udp

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

138/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

139/tcp

11011 - Microsoft Windows SMB Service Detection [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

445/tcp

86576 - Oracle Database Multiple Vulnerabilities (October 2015 CPU) [-/+]

91605 - MS16-077: Security Update for WPAD (3165191) [-/+]

92516 - Oracle Java SE Multiple Vulnerabilities (July 2016 CPU) [-/+]

97737 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) [-/+]

97743 - MS17-012: Security Update for Microsoft Windows (4013078) [-/+]

53382 - MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution (2500212) [-/+]

80906 - Oracle Database Multiple Vulnerabilities (January 2015 CPU) [-/+]

81264 - MS15-011: Vulnerability in Group Policy Could Allow Remote Code Execution (3000483) [-/+]

82903 - Oracle Database Multiple Vulnerabilities (April 2015 CPU) [-/+]

84822 - Oracle Database Multiple Vulnerabilities (July 2015 CPU) [-/+]

86823 - MS15-116: Security Update for Microsoft Office to Address Remote Code Execution (3104540) [-/+]

87253 - MS15-124: Cumulative Security Update for Internet Explorer (3116180) [-/+]

87257 - MS15-128: Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503) [-/+]

87260 - MS15-131: Security Update for Microsoft Office to Address Remote Code Execution (3116111) [-/+]

87882 - MS16-004: Security Update for Microsoft Office to Address Remote Code Execution (3124585) [-/+]

88146 - Oracle Database Multiple Vulnerabilities (January 2016 CPU) [-/+]

88647 - MS16-015: Security Update for Microsoft Office to Address Remote Code Execution (3134226) [-/+]

89752 - MS16-029: Security Update for Microsoft Office to Address Remote Code Execution (3141806) [-/+]

90431 - MS16-037: Cumulative Security Update for Internet Explorer (3148531) [-/+]

90433 - MS16-039: Security Update for Microsoft Graphics Component (3148522) [-/+]

90434 - MS16-040: Security Update for Microsoft XML Core Services (3148541) [-/+]

90436 - MS16-042: Security Update for Microsoft Office (3148775) [-/+]

90437 - MS16-044: Security Update for Windows OLE (3146706) [-/+]

90441 - MS16-048: Security Update for CSRSS (3148528) [-/+]

90625 - Oracle Java SE Multiple Vulnerabilities (April 2016 CPU) [-/+]

90762 - Oracle Database Multiple Vulnerabilities (April 2016 CPU) [-/+]

90828 - Oracle Java SE Hotspot JSR 292 Method Handles RCE [-/+]

91001 - MS16-051: Cumulative Security Update for Internet Explorer (3155533) [-/+]

91004 - MS16-054: Security Update for Microsoft Office (3155544) [-/+]

91005 - MS16-055: Security Update for Microsoft Graphics Component (3156754) [-/+]

91007 - MS16-057: Security Update for Windows Shell (3156987) [-/+]

91010 - MS16-060: Security Update for Windows Kernel (3154846) [-/+]

91011 - MS16-061: Security Update for Microsoft RPC (3155520) [-/+]

91012 - MS16-062: Security Update for Windows Kernel-Mode Drivers (3158222) [-/+]

91596 - MS16-063: Cumulative Security Update for Internet Explorer (3163649) [-/+]

91600 - MS16-072: Security Update for Group Policy (3163622) [-/+]

91601 - MS16-073: Security Update for Windows Kernel-Mode Drivers (3164028) [-/+]

91602 - MS16-074: Security Update for Microsoft Graphics Component (3164036) [-/+]

91603 - MS16-075: Security Update for Windows SMB Server (3164038) [-/+]

91604 - MS16-076: Security Update for Netlogon (3167691) [-/+]

91607 - MS16-080: Security Update for Microsoft Windows PDF (3164302) [-/+]

91611 - MS16-070: Security Update for Microsoft Office (3163610) [-/+]

92015 - MS16-084: Cumulative Security Update for Internet Explorer (3169991) [-/+]

92018 - MS16-087: Security Update for Windows Print Spooler (3170005) [-/+]

92019 - MS16-088: Security Update for Microsoft Office (3170008) [-/+]

92021 - MS16-090: Security Update for Windows Kernel-Mode Drivers (3171481) [-/+]

92023 - MS16-092: Security Update for Windows Kernel (3171910) [-/+]

92025 - MS16-094: Security Update for Secure Boot (3177404) [-/+]

92522 - Oracle Database Multiple Vulnerabilities (July 2016 CPU) (FREAK) [-/+]

92819 - MS16-095: Cumulative Security Update for Internet Explorer (3177356) [-/+]

92821 - MS16-098: Security Update for Windows Kernel-Mode Drivers (3178466) [-/+]

92822 - MS16-100: Security Update for Secure Boot (3179577) [-/+]

92823 - MS16-101: Security Update for Windows Authentication Methods (3178465) [-/+]

92824 - MS16-102: Security Update for Microsoft Windows PDF Library (3182248) [-/+]

92839 - MS16-099: Security Update for Microsoft Office (3177451) [-/+]

92843 - MS16-097: Security Update for Microsoft Graphics Component (3177393) [-/+]

93464 - MS16-104: Cumulative Security Update for Internet Explorer (3183038) [-/+]

93466 - MS16-106: Security Update for Microsoft Graphics Component (3185848) [-/+]

93470 - MS16-111: Security Update for Windows Kernel (3186973) [-/+]

93471 - MS16-112: Security Update for Windows Lock Screen (3178469) [-/+]

93473 - MS16-114: Security Update for Windows SMBv1 Server (3185879) [-/+]

93481 - MS16-107: Security Update for Microsoft Office (3185852) [-/+]

93651 - MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724) [-/+]

94011 - MS16-118: Cumulative Security Update for Internet Explorer (3192887) [-/+]

94012 - MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892) [-/+]

94016 - MS16-121: Security Update for Microsoft Office (3194063) [-/+]

94017 - MS16-120: Security Update for Microsoft Graphics Component (3192884) [-/+]

94138 - Oracle Java SE Multiple Vulnerabilities (October 2016 CPU) [-/+]

94201 - Oracle Database Multiple Vulnerabilities (October 2016 CPU) [-/+]

94631 - MS16-130: Security Update for Microsoft Windows (3199172) [-/+]

94633 - MS16-132: Security Update for Microsoft Graphics Component (3199120) [-/+]

94634 - MS16-133: Security Update for Microsoft Office (3199168) [-/+]

94635 - MS16-134: Security Update for Common Log File System Driver (3193706) [-/+]

94636 - MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135) [-/+]

94638 - MS16-137: Security Update for Windows Authentication Methods (3199173) [-/+]

94639 - MS16-138: Security Update for Microsoft Virtual Hard Disk Driver (3199647) [-/+]

94641 - MS16-140: Security Update for Boot Manager (3193479) [-/+]

94643 - MS16-142: Cumulative Security Update for Internet Explorer (3198467) [-/+]

95764 - MS16-144: Cumulative Security Update for Internet Explorer (3204059) [-/+]

95765 - MS16-146: Security Update for Microsoft Graphics Component (3204066) [-/+]

95766 - MS16-147: Security Update for Microsoft Uniscribe (3204063) [-/+]

95768 - MS16-151: Security Update for Windows Kernel-Mode Drivers (3205651) [-/+]

95811 - MS16-148: Security Update for Microsoft Office (3204068) [-/+]

95813 - MS16-149: Security Update for Microsoft Windows (3205655) [-/+]

96391 - MS17-002: Security Update for Microsoft Office (3214291) [-/+]

96611 - Oracle Database Multiple Vulnerabilities (January 2017 CPU) [-/+]

96628 - Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (SWEET32) [-/+]

97729 - MS17-006: Cumulative Security Update for Internet Explorer (4013073) [-/+]

97731 - MS17-009: Security Update for Microsoft Windows PDF Library (4010319) [-/+]

97732 - MS17-011: Security Update for Microsoft Uniscribe (4013076) [-/+]

97733 - MS17-017: Security Update for Windows Kernel (4013081) [-/+]

97738 - MS17-018: Security Update for Windows Kernel-Mode Drivers (4013083) [-/+]

97740 - MS17-014: Security Update for Microsoft Office (4013241) [-/+]

97794 - MS17-013: Security Update for Microsoft Graphics Component (4013075) [-/+]

63155 - Microsoft Windows Unquoted Service Path Enumeration [-/+]

78447 - MS KB3009008: Vulnerability in SSL 3.0 Could Allow Information Disclosure (POODLE) [-/+]

86849 - MS15-123: Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3105872) [-/+]

90440 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) [-/+]

91014 - MS16-065: Security Update for .NET Framework (3156757) [-/+]

91016 - MS16-067: Security Update for Volume Manager Driver (3155784) [-/+]

91045 - MS KB3155527: Update to Cipher Suites for FalseStart [-/+]

91609 - MS16-082: Security Update for Microsoft Windows Search Component (3165270) [-/+]

92022 - MS16-091: Security Update for .NET Framework (3170048) [-/+]

93474 - MS16-115: Security Update for Microsoft Windows PDF Library (3188733) [-/+]

97736 - MS17-021: Security Update for Windows DirectShow (4010318) [-/+]

97741 - MS17-016: Security Update for Windows IIS (4013074) [-/+]

97742 - MS17-022: Security Update for Microsoft XML Core Services (4010321) [-/+]

11457 - Microsoft Windows SMB Registry : Winlogon Cached Password Weakness [-/+]

94013 - MS16-124: Security Update for Windows Registry (3193227) [-/+]

95770 - MS16-153: Security Update for Common Log File System Driver (3207328) [-/+]

10394 - Microsoft Windows SMB Log In Possible [-/+]

10395 - Microsoft Windows SMB Shares Enumeration [-/+]

10396 - Microsoft Windows SMB Shares Access [-/+]

10398 - Microsoft Windows SMB LsaQueryInformationPolicy Function NULL Session Domain SID Enumeration [-/+]

10399 - SMB Use Domain SID to Enumerate Users [-/+]

10400 - Microsoft Windows SMB Registry Remotely Accessible [-/+]

10456 - Microsoft Windows SMB Service Enumeration [-/+]

10736 - DCE Services Enumeration [-/+]

10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure [-/+]

10859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration [-/+]

10860 - SMB Use Host SID to Enumerate Local Users [-/+]

10902 - Microsoft Windows 'Administrators' Group User List [-/+]

11011 - Microsoft Windows SMB Service Detection [-/+]

11777 - Microsoft Windows SMB Share Hosting Possibly Copyrighted Material [-/+]

12028 - Microsoft Windows SMB : WindowsUpdate Disabled [-/+]

17651 - Microsoft Windows SMB : Obtains the Password Policy [-/+]

20811 - Microsoft Windows Installed Software Enumeration (credentialed check) [-/+]

20836 - Adobe Reader Detection [-/+]

23974 - Microsoft Windows SMB Share Hosting Office Files [-/+]

33545 - Oracle Java Runtime Environment (JRE) Detection [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

35730 - Microsoft Windows USB Device Usage Report [-/+]

38689 - Microsoft Windows SMB Last Logged On User Disclosure [-/+]

44401 - Microsoft Windows SMB Service Config Enumeration [-/+]

48942 - Microsoft Windows SMB Registry : OS Version and Processor Architecture [-/+]

51351 - Microsoft .NET Framework Detection [-/+]

57033 - Microsoft Patch Bulletin Feasibility Check [-/+]

58181 - Windows DNS Server Enumeration [-/+]

58452 - Microsoft Windows Startup Software Enumeration [-/+]

60119 - Microsoft Windows SMB Share Permissions Enumeration [-/+]

63080 - Microsoft Windows Mounted Devices [-/+]

63620 - Windows Product Key Retrieval [-/+]

65739 - Oracle Java JRE Universally Enabled [-/+]

65743 - Oracle Java JRE Enabled (Internet Explorer) [-/+]

66424 - Microsoft Malicious Software Removal Tool Installed [-/+]

66517 - Adobe Reader Enabled in Browser (Internet Explorer) [-/+]

66542 - JavaScript Enabled in Adobe Reader [-/+]

68879 - Microsoft Lync Installed [-/+]

71643 - Oracle Installed Software Enumeration (Windows) [-/+]

71644 - Oracle Database Patch Info (credentialed check) [-/+]

72367 - Microsoft Internet Explorer Version Detection [-/+]

72879 - Microsoft Internet Explorer Enhanced Security Configuration Detection [-/+]

93232 - Microsoft Office Compatibility Pack Installed (credentialed check) [-/+]

93234 - Microsoft Visio Viewer Installed (credentialed check) [-/+]

97086 - Server Message Block (SMB) Protocol Version 1 Enabled [-/+]

500/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

1521/tcp

10658 - Oracle Database tnslsnr Service Remote Version Disclosure [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

2000/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

2001/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3341/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3389/tcp

18405 - Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness [-/+]

10940 - Windows Terminal Services Enabled [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

3389/udp

34220 - Netstat Portscanner (WMI) [-/+]

4500/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

5355/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

5985/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

6661/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

6662/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

8009/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

8080/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

47001/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49152/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49153/tcp

90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check) [-/+]

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49154/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49155/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49156/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49181/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49200/tcp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49225/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

49227/tcp

10736 - DCE Services Enumeration [-/+]

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

55103/udp

34220 - Netstat Portscanner (WMI) [-/+]

34252 - Microsoft Windows Remote Listeners Enumeration (WMI) [-/+]

192.168.109.201

Scan Information

Start time: Wed Apr 12 01:01:19 2017
End time: Wed Apr 12 01:10:27 2017

Host Information

OS: AIX 5.3, FreeBSD 3.4, FreeBSD 3.5, FreeBSD 4.2, FreeBSD 4.3

Results Summary

Critical High Medium Low Info Total
0 0 0 0 4 4

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

80/tcp

11219 - Nessus SYN scanner [-/+]

443/tcp

11219 - Nessus SYN scanner [-/+]

2404/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.1

Scan Information

Start time: Wed Apr 12 01:01:47 2017
End time: Wed Apr 12 01:11:32 2017

Host Information

OS: FreeBSD 10.3-RELEASE-p5 (amd64)

Results Summary

Critical High Medium Low Info Total
0 0 0 0 4 4

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

53/tcp

11219 - Nessus SYN scanner [-/+]

80/tcp

11219 - Nessus SYN scanner [-/+]

443/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.11

Scan Information

Start time: Wed Apr 12 01:02:00 2017
End time: Wed Apr 12 01:11:37 2017

Host Information

OS: Linux Kernel 3.1, Linux Kernel 3.3

Results Summary

Critical High Medium Low Info Total
0 0 0 0 2 2

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

443/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.13

Scan Information

Start time: Wed Apr 12 01:02:13 2017
End time: Wed Apr 12 01:12:26 2017

Host Information

OS: EPSON Stylus Printer, Linksys Wireless Access Point, Oracle Integrated Lights Out Manager

Results Summary

Critical High Medium Low Info Total
0 0 0 0 3 3

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

443/tcp

11219 - Nessus SYN scanner [-/+]

8900/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.15

Scan Information

Start time: Wed Apr 12 01:02:26 2017
End time: Wed Apr 12 01:12:50 2017

Host Information

OS: Linux Kernel 3.1, Linux Kernel 3.3

Results Summary

Critical High Medium Low Info Total
0 0 0 0 3 3

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

443/tcp

11219 - Nessus SYN scanner [-/+]

9001/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.112

Scan Information

Start time: Wed Apr 12 01:02:26 2017
End time: Wed Apr 12 01:13:41 2017

Host Information

DNS Name: WIN-2TCJ08A60LE
Netbios Name: WIN-2TCJ08A60LE
IP: 10.1.1.112
OS: Microsoft Windows Server 2012 R2 Datacenter

Results Summary

Critical High Medium Low Info Total
11 151 50 5 69 286

Results Details

0/tcp

96453 - Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) [-/+]

10913 - Microsoft Windows - Local Users Information : Disabled Accounts [-/+]

10914 - Microsoft Windows - Local Users Information : Never Changed Passwords [-/+]

10915 - Microsoft Windows - Local Users Information : User Has Never Logged In [-/+]

12634 - Authenticated Check : OS Name and Installed Package Enumeration [-/+]

19506 - Nessus Scan Information [-/+]

38153 - Microsoft Windows Summary of Missing Patches [-/+]

66334 - Patch Report [-/+]

135/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

137/udp

10150 - Windows NetBIOS / SMB Remote Host Information Disclosure [-/+]

14272 - netstat portscanner (SSH) [-/+]

138/udp

14272 - netstat portscanner (SSH) [-/+]

139/tcp

11011 - Microsoft Windows SMB Service Detection [-/+]

14272 - netstat portscanner (SSH) [-/+]

445/tcp

40362 - Mozilla Foundation Unsupported Application Detection [-/+]

62758 - Microsoft XML Parser (MSXML) and XML Core Services Unsupported [-/+]

72704 - Microsoft .NET Framework Unsupported [-/+]

73985 - MS14-026: Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732) [-/+]

78432 - MS14-057: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (3000414) [-/+]

79127 - MS14-066: Vulnerability in Schannel Could Allow Remote Code Execution (2992611) [-/+]

82771 - MS15-034: Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553) [-/+]

88644 - MS16-012: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) [-/+]

91605 - MS16-077: Security Update for WPAD (3165191) [-/+]

97737 - MS17-010: Security Update for Microsoft Windows SMB Server (4013389) [-/+]

97743 - MS17-012: Security Update for Microsoft Windows (4013078) [-/+]

53382 - MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution (2500212) [-/+]

70332 - MS13-080: Cumulative Security Update for Internet Explorer (2879017) [-/+]

70846 - MS13-088: Cumulative Security Update for Internet Explorer (2888505) [-/+]

70847 - MS13-089: Critical Vulnerability in Windows Graphics Device Interface Could Allow Remote Code Execution (2876331) [-/+]

70848 - MS13-090: Cumulative Security Update of ActiveX Kill Bits (2900986) [-/+]

71312 - MS13-097: Cumulative Security Update for Internet Explorer (2898785) [-/+]

71313 - MS13-098: Vulnerability in Windows Could Allow Remote Code Execution (2893294) [-/+]

71314 - MS13-099: Vulnerability in Microsoft Scripting Runtime Object Library Could Allow Remote Code Execution (2909158) [-/+]

71316 - MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2880430) [-/+]

72428 - MS14-005: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2916036) [-/+]

72430 - MS14-007: Vulnerability in Direct2D Could Allow Remote Code Execution (2912390) [-/+]

72432 - MS14-009: Vulnerabilities in .NET Framework Could Allow Privilege Escalation (2916607) [-/+]

72433 - MS14-010: Cumulative Security Update for Internet Explorer (2909921) [-/+]

72434 - MS14-011: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (2928390) [-/+]

72930 - MS14-012: Cumulative Security Update for Internet Explorer (2925418) [-/+]

72934 - MS14-015: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (2930275) [-/+]

73415 - MS14-018: Cumulative Security Update for Internet Explorer (2950467) [-/+]

73416 - MS14-019: Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229) [-/+]

73805 - MS14-021: Security Update for Internet Explorer (2965111) [-/+]

73986 - MS14-027: Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488) [-/+]

73988 - MS14-029: Security Update for Internet Explorer (2962482) [-/+]

74427 - MS14-035: Cumulative Security Update for Internet Explorer (2969262) [-/+]

74428 - MS14-036: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487) [-/+]

76406 - MS14-037: Cumulative Security Update for Internet Explorer (2975687) [-/+]

76408 - MS14-039: Vulnerability in On-Screen Keyboard Could Allow Elevation of Privilege (2975685) [-/+]

76409 - MS14-040: Vulnerability in Ancillary Function Driver (AFD) Could Allow Elevation of Privilege (2975684) [-/+]

77167 - MS14-049: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (2962490) [-/+]

77574 - MS14-054: Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege (2988948) [-/+]

78433 - MS14-058: Vulnerabilities in Kernel-Mode Driver Could Allow Remote Code Execution (3000061) [-/+]

78435 - MS14-060: Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869) [-/+]

79125 - MS14-064: Vulnerabilities in Windows OLE Could Allow Remote Code Execution (3011443) [-/+]

79132 - MS14-072: Vulnerability in .NET Framework Could Allow Elevation of Privilege (3005210) [-/+]

79138 - MS14-079: Vulnerability in Kernel-Mode Driver Could Allow Denial of Service (3002885) [-/+]

79311 - MS14-068: Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780) [-/+]

80490 - MS15-001: Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege (3023266) [-/+]

80492 - MS15-003: Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674) [-/+]

81262 - MS15-009: Security Update for Internet Explorer (3034682) [-/+]

81263 - MS15-010: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220) [-/+]

81268 - MS15-015: Vulnerability in Microsoft Windows Could Allow Elevation of Privilege (3031432) [-/+]

81733 - MS15-018: Cumulative Security Update for Internet Explorer (3032359) [-/+]

81735 - MS15-020: Vulnerabilities in Microsoft Windows Could Allow Remote Code Execution (3041836) [-/+]

81736 - MS15-021: Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution (3032323) [-/+]

81739 - MS15-025: Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (3038680) [-/+]

81742 - MS15-028: Vulnerability in Windows Task Scheduler Could Allow Security Feature Bypass (3030377) [-/+]

82770 - MS15-032: Cumulative Security Update for Internet Explorer (3038314) [-/+]

82774 - MS15-038: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege (3049576) [-/+]

83355 - MS15-050: Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642) [-/+]

83356 - MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134) [-/+]

83358 - MS15-043: Cumulative Security Update for Internet Explorer (3049563) [-/+]

83370 - MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) [-/+]

83440 - MS15-044: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110) [-/+]

84053 - MS15-056: Cumulative Security Update for Internet Explorer (3058515) [-/+]

84056 - MS15-060: Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution (3059317) [-/+]

84059 - MS15-061: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057839) [-/+]

84734 - MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution (3072631) [-/+]

84744 - MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392) [-/+]

84746 - MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657) [-/+]

84747 - MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102) [-/+]

84748 - MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505) [-/+]

84761 - MS15-065: Cumulative Security Update for Internet Explorer (3076321) [-/+]

84762 - MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000) [-/+]

84882 - MS15-078: Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution (3079904) [-/+]

85330 - MS15-085: Vulnerability in Mount Manager Could Allow Elevation of Privilege (3082487) [-/+]

85348 - MS15-080 : Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3078662) [-/+]

85844 - MS15-102: Vulnerabilities in Windows Task Management Could Allow Elevation of Privilege (3089657) [-/+]

85847 - MS15-101: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662) [-/+]

85877 - MS15-097: Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (3089656) [-/+]

86366 - MS15-109: Security Update for Windows Shell to Address Remote Code Execution (3096443) [-/+]

86373 - MS15-111: Security Update for Windows Kernel to Address Elevation of Privilege (3096447) [-/+]

86822 - MS15-115: Security Update for Microsoft Windows to Address Remote Code Execution (3105864) [-/+]

86826 - MS15-119: Security Update for Winsock to Address Elevation of Privilege (3104521) [-/+]

86828 - MS15-122: Security Update for Kerberos to Address Security Feature Bypass (3105256) [-/+]

87253 - MS15-124: Cumulative Security Update for Internet Explorer (3116180) [-/+]

87257 - MS15-128: Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503) [-/+]

87261 - MS15-132: Security Update for Microsoft Windows to Address Remote Code Execution (3116162) [-/+]

87262 - MS15-133: Security Update for Windows PGM to Address Elevation of Privilege (3116130) [-/+]

87264 - MS15-135: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3119075) [-/+]

87881 - MS16-008: Security Update for Windows Kernel to Address Elevation of Privilege (3124605) [-/+]

87890 - MS16-007: Security Update for Microsoft Windows to Address Remote Code Execution (3124901) [-/+]

87892 - MS16-005: Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584) [-/+]

87893 - MS KB3118753: Update for ActiveX Kill Bits [-/+]

88646 - MS16-014: Security Update for Microsoft Windows to Address Remote Code Execution (3134228) [-/+]

88649 - MS16-017: Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) [-/+]

88650 - MS16-018: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082) [-/+]

89749 - MS16-026: Security Update for Graphic Fonts to Address Remote Code Execution (3143148) [-/+]

89751 - MS16-028: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3143081) [-/+]

89753 - MS16-030: Security Update for Windows OLE to Address Remote Code Execution (3143136) [-/+]

89755 - MS16-032: Security Update for Secondary Logon to Address Elevation of Privilege (3143141) [-/+]

89756 - MS16-034: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3143145) [-/+]

89779 - MS16-033: Security Update for Windows USB Mass Storage Class Driver to Address Elevation of Privilege (3143142) [-/+]

90433 - MS16-039: Security Update for Microsoft Graphics Component (3148522) [-/+]

90434 - MS16-040: Security Update for Microsoft XML Core Services (3148541) [-/+]

90437 - MS16-044: Security Update for Windows OLE (3146706) [-/+]

90441 - MS16-048: Security Update for CSRSS (3148528) [-/+]

91005 - MS16-055: Security Update for Microsoft Graphics Component (3156754) [-/+]

91007 - MS16-057: Security Update for Windows Shell (3156987) [-/+]

91010 - MS16-060: Security Update for Windows Kernel (3154846) [-/+]

91011 - MS16-061: Security Update for Microsoft RPC (3155520) [-/+]

91012 - MS16-062: Security Update for Windows Kernel-Mode Drivers (3158222) [-/+]

91596 - MS16-063: Cumulative Security Update for Internet Explorer (3163649) [-/+]

91600 - MS16-072: Security Update for Group Policy (3163622) [-/+]

91601 - MS16-073: Security Update for Windows Kernel-Mode Drivers (3164028) [-/+]

91602 - MS16-074: Security Update for Microsoft Graphics Component (3164036) [-/+]

91603 - MS16-075: Security Update for Windows SMB Server (3164038) [-/+]

91604 - MS16-076: Security Update for Netlogon (3167691) [-/+]

91607 - MS16-080: Security Update for Microsoft Windows PDF (3164302) [-/+]

92018 - MS16-087: Security Update for Windows Print Spooler (3170005) [-/+]

92021 - MS16-090: Security Update for Windows Kernel-Mode Drivers (3171481) [-/+]

92023 - MS16-092: Security Update for Windows Kernel (3171910) [-/+]

92025 - MS16-094: Security Update for Secure Boot (3177404) [-/+]

92821 - MS16-098: Security Update for Windows Kernel-Mode Drivers (3178466) [-/+]

92822 - MS16-100: Security Update for Secure Boot (3179577) [-/+]

92823 - MS16-101: Security Update for Windows Authentication Methods (3178465) [-/+]

92824 - MS16-102: Security Update for Microsoft Windows PDF Library (3182248) [-/+]

92843 - MS16-097: Security Update for Microsoft Graphics Component (3177393) [-/+]

93466 - MS16-106: Security Update for Microsoft Graphics Component (3185848) [-/+]

93470 - MS16-111: Security Update for Windows Kernel (3186973) [-/+]

93471 - MS16-112: Security Update for Windows Lock Screen (3178469) [-/+]

93473 - MS16-114: Security Update for Windows SMBv1 Server (3185879) [-/+]

93651 - MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724) [-/+]

93940 - Wireshark 2.2.x < 2.2.1 Multiple DoS [-/+]

94011 - MS16-118: Cumulative Security Update for Internet Explorer (3192887) [-/+]

94012 - MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892) [-/+]

94017 - MS16-120: Security Update for Microsoft Graphics Component (3192884) [-/+]

94631 - MS16-130: Security Update for Microsoft Windows (3199172) [-/+]

94633 - MS16-132: Security Update for Microsoft Graphics Component (3199120) [-/+]

94635 - MS16-134: Security Update for Common Log File System Driver (3193706) [-/+]

94636 - MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135) [-/+]

94638 - MS16-137: Security Update for Windows Authentication Methods (3199173) [-/+]

94639 - MS16-138: Security Update for Microsoft Virtual Hard Disk Driver (3199647) [-/+]

94641 - MS16-140: Security Update for Boot Manager (3193479) [-/+]

94643 - MS16-142: Cumulative Security Update for Internet Explorer (3198467) [-/+]

94960 - Mozilla Firefox < 50.0 Multiple Vulnerabilities [-/+]

95475 - Mozilla Firefox < 50.0.2 nsSMILTimeContainer.cpp SVG Animation RCE [-/+]

95764 - MS16-144: Cumulative Security Update for Internet Explorer (3204059) [-/+]

95765 - MS16-146: Security Update for Microsoft Graphics Component (3204066) [-/+]

95766 - MS16-147: Security Update for Microsoft Uniscribe (3204063) [-/+]

95768 - MS16-151: Security Update for Windows Kernel-Mode Drivers (3205651) [-/+]

95813 - MS16-149: Security Update for Microsoft Windows (3205655) [-/+]

95886 - Mozilla Firefox < 50.1 Multiple Vulnerabilities [-/+]

96776 - Mozilla Firefox < 51.0 Multiple Vulnerabilities [-/+]

97574 - Wireshark 2.0.x < 2.0.11 / 2.2.x < 2.2.5 Multiple DoS [-/+]

97639 - Mozilla Firefox < 52.0 Multiple Vulnerabilities [-/+]

97729 - MS17-006: Cumulative Security Update for Internet Explorer (4013073) [-/+]

97731 - MS17-009: Security Update for Microsoft Windows PDF Library (4010319) [-/+]

97732 - MS17-011: Security Update for Microsoft Uniscribe (4013076) [-/+]

97733 - MS17-017: Security Update for Windows Kernel (4013081) [-/+]

97738 - MS17-018: Security Update for Windows Kernel-Mode Drivers (4013083) [-/+]

97794 - MS17-013: Security Update for Microsoft Graphics Component (4013075) [-/+]

99125 - Mozilla Firefox < 52.0.1 CreateImageBitmap RCE [-/+]

70853 - MS13-095: Vulnerability in Digital Signatures Could Allow Denial of Service (2868626) [-/+]

74422 - MS14-030: Vulnerability in Remote Desktop Could Allow Tampering (2969259) [-/+]

74423 - MS14-031: Vulnerability in TCP Protocol Could Allow Denial of Service (2962478) [-/+]

74425 - MS14-033: Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061) [-/+]

77165 - MS14-047: Vulnerability in LRPC Could Allow Security Feature Bypass (2978668) [-/+]

77573 - MS14-053: Vulnerability in .NET Framework Could Allow Denial of Service (2990931) [-/+]

78446 - MS KB2977292: Update for Microsoft EAP Implementation that Enables the Use of TLS [-/+]

78447 - MS KB3009008: Vulnerability in SSL 3.0 Could Allow Information Disclosure (POODLE) [-/+]

79131 - MS14-071: Vulnerability in Windows Audio Service Could Allow Elevation of Privilege (3005607) [-/+]

79134 - MS14-074: Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass (3003743) [-/+]

79834 - MS14-085: Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure (3013126) [-/+]

80493 - MS15-004: Vulnerability in Windows Components Could Allow Elevation of Privilege (3025421) [-/+]

80494 - MS15-005: Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777) [-/+]

80496 - MS15-007: Vulnerability in Network Policy Server RADIUS Implementation Could Cause Denial of Service (3014029) [-/+]

81269 - MS15-016: Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure (3029944) [-/+]

81737 - MS15-023: Vulnerabilities in Kernel-Mode Driver Could Allow Elevation of Privilege (3034344) [-/+]

81738 - MS15-024: Vulnerability in PNG Processing Could Allow Information Disclosure (3035132) [-/+]

81743 - MS15-029: Vulnerability in Windows Photo Decoder Component Could Allow Information Disclosure (3035126) [-/+]

81744 - MS15-030: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service (3039976) [-/+]

81745 - MS15-031: Vulnerability in Schannel Could Allow Security Feature Bypass (3046049) (FREAK) [-/+]

82777 - MS15-041: Vulnerability in .NET Framework Could Allow Information Disclosure (3048010) [-/+]

83360 - MS15-055: Vulnerability in Schannel Could Allow Information Disclosure (3061518) [-/+]

83361 - MS15-052: Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514) [-/+]

83363 - MS15-054: Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768) [-/+]

84741 - MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633) [-/+]

84745 - MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630) [-/+]

85322 - MS15-090: Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege (3060716) [-/+]

85332 - MS15-082: Vulnerability in RDP Could Allow Remote Code Execution (3080348) [-/+]

85334 - MS15-088: Unsafe Command Line Parameter Passing Could Allow Information Disclosure (3082458) [-/+]

85335 - MS15-084: Vulnerabilities in XML Core Services Could Allow Information Disclosure (3080129) [-/+]

85846 - MS15-096: Vulnerability in Active Directory Service Could Allow Denial of Service (3072595) [-/+]

86149 - MS KB3097966: Inadvertently Disclosed Digital Certificates Could Allow Spoofing [-/+]

86825 - MS15-118: Security Update for .NET Framework to Address Elevation of Privilege (3104507) [-/+]

86827 - MS15-121: Security Update for Schannel to Address Spoofing (3081320) [-/+]

86830 - MS15-120: Security Update for IPSec to Address Denial of Service (3102939) [-/+]

87875 - MS KB3123479: Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program [-/+]

88652 - MS16-020: Security Update for Active Directory Federation Services to Address Denial of Service (3134222) [-/+]

88653 - MS16-021: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) [-/+]

90440 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) [-/+]

91016 - MS16-067: Security Update for Volume Manager Driver (3155784) [-/+]

91045 - MS KB3155527: Update to Cipher Suites for FalseStart [-/+]

91609 - MS16-082: Security Update for Microsoft Windows Search Component (3165270) [-/+]

93474 - MS16-115: Security Update for Microsoft Windows PDF Library (3188733) [-/+]

95435 - Wireshark 2.0.x < 2.0.8 / 2.2.x < 2.2.2 Multiple DoS [-/+]

95437 - Mozilla Firefox 49.x < 50.0.1 HTTP Redirect Handling Same-origin Policy Bypass [-/+]

96765 - Wireshark 2.0.x < 2.0.10 / 2.2.x < 2.2.4 Multiple DoS [-/+]

97736 - MS17-021: Security Update for Windows DirectShow (4010318) [-/+]

97741 - MS17-016: Security Update for Windows IIS (4013074) [-/+]

97742 - MS17-022: Security Update for Microsoft XML Core Services (4010321) [-/+]

11457 - Microsoft Windows SMB Registry : Winlogon Cached Password Weakness [-/+]

80495 - MS15-006: Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) [-/+]

81267 - MS15-014: Vulnerability in Group Policy Could Allow Security Feature Bypass (3004361) [-/+]

94013 - MS16-124: Security Update for Windows Registry (3193227) [-/+]

95770 - MS16-153: Security Update for Common Log File System Driver (3207328) [-/+]

10394 - Microsoft Windows SMB Log In Possible [-/+]

10395 - Microsoft Windows SMB Shares Enumeration [-/+]

10396 - Microsoft Windows SMB Shares Access [-/+]

10400 - Microsoft Windows SMB Registry Remotely Accessible [-/+]

10456 - Microsoft Windows SMB Service Enumeration [-/+]

10736 - DCE Services Enumeration [-/+]

10785 - Microsoft Windows SMB NativeLanManager Remote System Information Disclosure [-/+]

10859 - Microsoft Windows SMB LsaQueryInformationPolicy Function SID Enumeration [-/+]

10860 - SMB Use Host SID to Enumerate Local Users [-/+]

10902 - Microsoft Windows 'Administrators' Group User List [-/+]

11011 - Microsoft Windows SMB Service Detection [-/+]

14272 - netstat portscanner (SSH) [-/+]

17651 - Microsoft Windows SMB : Obtains the Password Policy [-/+]

20811 - Microsoft Windows Installed Software Enumeration (credentialed check) [-/+]

20836 - Adobe Reader Detection [-/+]

20862 - Mozilla Foundation Application Detection [-/+]

34112 - Wireshark / Ethereal Detection (Windows) [-/+]

35730 - Microsoft Windows USB Device Usage Report [-/+]

44401 - Microsoft Windows SMB Service Config Enumeration [-/+]

48942 - Microsoft Windows SMB Registry : OS Version and Processor Architecture [-/+]

51351 - Microsoft .NET Framework Detection [-/+]

57033 - Microsoft Patch Bulletin Feasibility Check [-/+]

58181 - Windows DNS Server Enumeration [-/+]

58452 - Microsoft Windows Startup Software Enumeration [-/+]

63080 - Microsoft Windows Mounted Devices [-/+]

66517 - Adobe Reader Enabled in Browser (Internet Explorer) [-/+]

71156 - Tenable Passive Vulnerability Scanner Installed (Windows) (credentialed check) [-/+]

72367 - Microsoft Internet Explorer Version Detection [-/+]

72879 - Microsoft Internet Explorer Enhanced Security Configuration Detection [-/+]

73990 - MS KB2871997: Update to Improve Credentials Protection and Management [-/+]

82779 - MS KB3045755: Update to Improve PKU2U Authentication [-/+]

83359 - MS KB3042058: Update to Default Cipher Suite Priority Order [-/+]

85880 - MS KB3083992: Update to Improve AppLocker Publisher Rule Enforcement [-/+]

87876 - MS KB3109853: Update to Improve TLS Session Resumption Interoperability [-/+]

96534 - Firefox Browser Extension Enumeration [-/+]

97086 - Server Message Block (SMB) Protocol Version 1 Enabled [-/+]

1025/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

1026/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

1027/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

1028/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

1035/tcp

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

1048/tcp

90510 - MS16-047: Security Update for SAM and LSAD Remote Protocols (3148527) (Badlock) (uncredentialed check) [-/+]

10736 - DCE Services Enumeration [-/+]

14272 - netstat portscanner (SSH) [-/+]

5355/udp

14272 - netstat portscanner (SSH) [-/+]

5985/tcp

14272 - netstat portscanner (SSH) [-/+]

8834/tcp

14272 - netstat portscanner (SSH) [-/+]

47001/tcp

14272 - netstat portscanner (SSH) [-/+]

53947/udp

14272 - netstat portscanner (SSH) [-/+]

53950/udp

14272 - netstat portscanner (SSH) [-/+]

57495/udp

14272 - netstat portscanner (SSH) [-/+]

10.1.1.114

Scan Information

Start time: Wed Apr 12 01:02:40 2017
End time: Wed Apr 12 01:07:43 2017

Host Information

OS: Linux Kernel 2.6.32-642.el6.x86_64 on CentOS release 6.8 (Final)

Results Summary

Critical High Medium Low Info Total
7 33 21 3 17 81

Results Details

0/tcp

90636 - CentOS 6 : java-1.7.0-openjdk (CESA-2016:0675) [-/+]

90723 - CentOS 5 / 6 / 7 : firefox (CESA-2016:0695) [-/+]

91018 - CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2016:0723) [-/+]

91786 - CentOS 6 / 7 : libxml2 (CESA-2016:1292) [-/+]

96456 - CentOS 6 : kernel (CESA-2017:0036) [-/+]

96812 - CentOS 6 : mysql (CESA-2017:0184) [-/+]

97389 - CentOS 6 : kernel (CESA-2017:0307) [-/+]

91172 - CentOS 6 : qemu-kvm (CESA-2016:0997) [-/+]

92026 - CentOS 6 : kernel (CESA-2016:1406) [-/+]

92586 - CentOS 5 / 6 / 7 : java-1.7.0-openjdk (CESA-2016:1504) [-/+]

92682 - CentOS 6 : libtiff (CESA-2016:1547) [-/+]

92703 - CentOS 5 / 6 / 7 : firefox (CESA-2016:1551) [-/+]

93666 - CentOS 5 / 6 / 7 : firefox (CESA-2016:1912) [-/+]

93777 - CentOS 6 / 7 : openssl (CESA-2016:1940) [-/+]

93779 - CentOS 5 / 6 / 7 : bind (CESA-2016:1944) [-/+]

93867 - CentOS 6 : kernel (CESA-2016:2006) [-/+]

94292 - CentOS 6 : kernel (CESA-2016:2105) (Dirty COW) [-/+]

94740 - CentOS 5 / 6 / 7 : java-1.7.0-openjdk (CESA-2016:2658) [-/+]

94978 - CentOS 6 / 7 : policycoreutils (CESA-2016:2702) [-/+]

94980 - CentOS 6 : kernel (CESA-2016:2766) [-/+]

94981 - CentOS 5 / 6 / 7 : nss / nss-util (CESA-2016:2779) [-/+]

94982 - CentOS 5 / 6 : firefox (CESA-2016:2780) [-/+]

95373 - CentOS 6 / 7 : expat (CESA-2016:2824) [-/+]

95484 - CentOS 5 / 6 / 7 : firefox (CESA-2016:2843) [-/+]

96004 - CentOS 5 / 6 / 7 : firefox (CESA-2016:2946) [-/+]

96050 - CentOS 6 : gstreamer-plugins-good (CESA-2016:2975) [-/+]

96457 - CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2017:0061) [-/+]

96813 - CentOS 5 / 6 / 7 : firefox (CESA-2017:0190) [-/+]

96929 - CentOS 6 / 7 : libtiff (CESA-2017:0225) [-/+]

97026 - CentOS 6 / 7 : ntp (CESA-2017:0252) [-/+]

97305 - CentOS 6 / 7 : openssl (CESA-2017:0286) [-/+]

97330 - CentOS 6 : kernel (CESA-2017:0293) [-/+]

97472 - CentOS 6 : qemu-kvm (CESA-2017:0352) [-/+]

97612 - CentOS 5 / 6 : firefox (CESA-2017:0459) [-/+]

97837 - CentOS 6 : openjpeg (CESA-2017:0559) [-/+]

97951 - CentOS 6 : gnutls (CESA-2017:0574) [-/+]

97955 - CentOS 6 : openssh (CESA-2017:0641) [-/+]

97958 - CentOS 6 : glibc (CESA-2017:0680) [-/+]

97959 - CentOS 6 : bash (CESA-2017:0725) [-/+]

97962 - CentOS 6 : kernel (CESA-2017:0817) [-/+]

91394 - CentOS 6 / 7 : ntp (CESA-2016:1141) [-/+]

91635 - CentOS 5 / 6 / 7 : firefox (CESA-2016:1217) [-/+]

92378 - CentOS 5 / 6 : httpd (CESA-2016:1421) (httpoxy) [-/+]

92567 - CentOS 6 : samba4 (CESA-2016:1487) [-/+]

92826 - CentOS 6 : qemu-kvm (CESA-2016:1585) [-/+]

93029 - CentOS 6 / 7 : python (CESA-2016:1626) (httpoxy) [-/+]

93099 - CentOS 6 : kernel (CESA-2016:1664) [-/+]

93129 - CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2016:1776) [-/+]

93318 - CentOS 6 / 7 : ipa (CESA-2016:1797) [-/+]

93542 - CentOS 6 : libarchive (CESA-2016:1850) [-/+]

94202 - CentOS 5 / 6 : bind (CESA-2016:2093) [-/+]

94471 - CentOS 5 / 6 : bind (CESA-2016:2141) [-/+]

94741 - CentOS 6 / 7 : libgcrypt (CESA-2016:2674) [-/+]

95577 - CentOS 6 / 7 : sudo (CESA-2016:2872) [-/+]

96048 - CentOS 6 / 7 : vim (CESA-2016:2972) [-/+]

96049 - CentOS 6 : gstreamer-plugins-bad-free (CESA-2016:2974) [-/+]

96286 - CentOS 6 : ghostscript (CESA-2017:0014) [-/+]

96568 - CentOS 5 / 6 : bind (CESA-2017:0063) [-/+]

97134 - CentOS 5 / 6 / 7 : java-1.7.0-openjdk (CESA-2017:0269) [-/+]

97957 - CentOS 6 : samba (CESA-2017:0662) [-/+]

97960 - CentOS 6 : samba4 (CESA-2017:0744) [-/+]

97390 - CentOS 6 : qemu-kvm (CESA-2017:0309) [-/+]

97952 - CentOS 6 : qemu-kvm (CESA-2017:0621) [-/+]

97956 - CentOS 6 : coreutils (CESA-2017:0654) [-/+]

12634 - Authenticated Check : OS Name and Installed Package Enumeration [-/+]

19506 - Nessus Scan Information [-/+]

66334 - Patch Report [-/+]

22/tcp

14272 - netstat portscanner (SSH) [-/+]

111/udp

14272 - netstat portscanner (SSH) [-/+]

162/udp

14272 - netstat portscanner (SSH) [-/+]

631/udp

14272 - netstat portscanner (SSH) [-/+]

699/udp

14272 - netstat portscanner (SSH) [-/+]

3306/tcp

10719 - MySQL Server Detection [-/+]

14272 - netstat portscanner (SSH) [-/+]

5000/tcp

14272 - netstat portscanner (SSH) [-/+]

8009/tcp

14272 - netstat portscanner (SSH) [-/+]

8443/tcp

14272 - netstat portscanner (SSH) [-/+]

39317/tcp

14272 - netstat portscanner (SSH) [-/+]

43244/udp

14272 - netstat portscanner (SSH) [-/+]

57852/udp

14272 - netstat portscanner (SSH) [-/+]

59654/tcp

14272 - netstat portscanner (SSH) [-/+]

10.1.1.115

Scan Information

Start time: Wed Apr 12 01:02:52 2017
End time: Wed Apr 12 01:05:11 2017

Host Information

OS: Linux Kernel 3.10, Linux Kernel 3.13, Linux Kernel 4.2, Linux Kernel 4.8

Results Summary

Critical High Medium Low Info Total
0 0 1 0 16 17

Results Details

0/tcp

19506 - Nessus Scan Information [-/+]

21745 - Authentication Failure - Local Checks Not Run [-/+]

22/tcp

11219 - Nessus SYN scanner [-/+]

80/tcp

11219 - Nessus SYN scanner [-/+]

514/tcp

11219 - Nessus SYN scanner [-/+]

2379/tcp

11219 - Nessus SYN scanner [-/+]

3333/tcp

11219 - Nessus SYN scanner [-/+]

4001/tcp

11219 - Nessus SYN scanner [-/+]

9000/tcp

11219 - Nessus SYN scanner [-/+]

9200/tcp

11219 - Nessus SYN scanner [-/+]

9300/tcp

11219 - Nessus SYN scanner [-/+]

9350/tcp

11219 - Nessus SYN scanner [-/+]

12201/tcp

11219 - Nessus SYN scanner [-/+]

27017/tcp

81777 - MongoDB Service Without Authentication Detection [-/+]

11219 - Nessus SYN scanner [-/+]

40649/tcp

11219 - Nessus SYN scanner [-/+]

44317/tcp

11219 - Nessus SYN scanner [-/+]

10.1.1.120

Scan Information

Start time: Wed Apr 12 01:03:05 2017
End time: Wed Apr 12 01:03:45 2017

Host Information

OS: Linux Kernel 4.4.0-62-generic on Ubuntu 16.04

Results Summary

Critical High Medium Low Info Total
0 4 1 0 6 11

Results Details

0/tcp

97322 - Ubuntu 16.04 LTS : linux, linux-snapdragon vulnerabilities (USN-3208-1) [-/+]

97605 - Ubuntu 16.04 LTS : linux, linux-gke, linux-raspi2, linux-snapdragon vulnerability (USN-3220-1) [-/+]

99096 - Ubuntu 16.04 LTS : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerability (USN-3249-1) [-/+]

99197 - Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon, linux-ti-omap4 vulnerability (USN-3256-1) [-/+]

97778 - Ubuntu 16.04 LTS : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon vulnerabilities (USN-3234-1) [-/+]

12634 - Authenticated Check : OS Name and Installed Package Enumeration [-/+]

19506 - Nessus Scan Information [-/+]

66334 - Patch Report [-/+]

22/tcp

14272 - netstat portscanner (SSH) [-/+]

3780/tcp

14272 - netstat portscanner (SSH) [-/+]

40815/tcp

14272 - netstat portscanner (SSH) [-/+]

Remediations

[-] Collapse All
[+] Expand All

Suggested Remediations

Taking the following actions across 7 hosts would resolve 58% of the vulnerabilities on the network:
Action to take Vulns Hosts
Oracle Database Multiple Vulnerabilities (January 2017 CPU): Apply the appropriate patch according to the January 2017 Oracle Critical Patch Update advisory. 120 2
RHEL 7 : mariadb (RHSA-2016:2595): Update the affected packages. 102 2
RHEL 7 : kernel (RHSA-2017:0386): Update the affected packages. 96 2
Mozilla Firefox < 52.0.1 CreateImageBitmap RCE: Upgrade to Mozilla Firefox version 52.0.1 or later. 86 1
CentOS 5 / 6 : firefox (CESA-2017:0459): Update the affected firefox package. 70 1
RHEL 6 / 7 : java-1.8.0-openjdk (RHSA-2017:0180): Update the affected packages. 62 2
Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01): Upgrade to Adobe Reader version 11.0.19 / 15.006.30279 / 15.023.20053 or later. 62 2
RHEL 5 / 6 / 7 : java-1.7.0-openjdk (RHSA-2017:0269): Update the affected packages. 58 2
RHEL 6 / 7 : libtiff (RHSA-2017:0225): Update the affected packages. 54 2
RHEL 5 / 6 / 7 : firefox (RHSA-2016:0373): Update the affected firefox and / or firefox-debuginfo packages. 52 2
RHEL 6 / 7 : ntp (RHSA-2017:0252): Update the affected packages. 48 2
Install MS17-013 96 6
RHEL 6 / 7 : openssl (RHSA-2017:0286): Update the affected packages. 36 2
Install MS16-106 33 3
Oracle Java SE Multiple Vulnerabilities (January 2017 CPU) (SWEET32): Upgrade to Oracle JDK / JRE 8 Update 121 / 7 Update 131 / 6 Update 141 or later. If necessary, remove any affected versions. Note that an Extended Support contract with Oracle is needed to obtain JDK / JRE 6 Update 95 or later. 30 1
CentOS 5 / 6 / 7 : java-1.7.0-openjdk (CESA-2017:0269): Update the affected java-1.7.0-openjdk packages. 28 1
RHEL 6 / 7 : libxml2 (RHSA-2016:1292): Update the affected packages. 28 2
CentOS 6 / 7 : libtiff (CESA-2017:0225): Update the affected libtiff packages. 27 1
RHEL 6 / 7 : ImageMagick (RHSA-2016:1237): Update the affected packages. 24 2
CentOS 6 : kernel (CESA-2017:0817): Update the affected kernel packages. Note that the updated packages may not be immediately available from the package repository and its mirrors. 22 1
RHEL 7 : samba (RHSA-2016:1486): Update the affected packages. 20 2
RHEL 7 : bind (RHSA-2017:0276): Update the affected packages. 16 2
RHEL 7 : pcre (RHSA-2016:1025): Update the affected packages. 16 2
CentOS 5 / 6 / 7 : java-1.6.0-openjdk (CESA-2017:0061): Update the affected java-1.6.0-openjdk packages. 15 1
CentOS 6 / 7 : libxml2 (CESA-2016:1292): Update the affected libxml2 packages. 14 1
Install MS16-110 14 1
RHEL 5 / 6 / 7 : nss and nss-util (RHSA-2016:2779): Update the affected packages. 12 2
Install MS17-006 24 6
Install MS16-149 24 6
Install MS16-142 24 6
Install MS16-132 24 6
Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS / 16.10 : linux, linux-aws, linux-gke, linux-raspi2, linux-snapdragon, linux-ti-omap4 vulnerability (USN-3256-1): Update the affected packages. 11 1
CentOS 6 / 7 : openssl (CESA-2017:0286): Update the affected openssl packages. 11 1
CentOS 6 / 7 : ntp (CESA-2017:0252): Update the affected ntp packages. 10 1
RHEL 7 : ghostscript (RHSA-2017:0013): Update the affected packages. 10 2
RHEL 7 : krb5 (RHSA-2016:2591): Update the affected packages. 10 2
Install MS17-022 18 6
Install MS16-130 18 6
Install MS15-085 8 1
RHEL 7 : graphite2 (RHSA-2016:0594): Update the affected graphite2, graphite2-debuginfo and / or graphite2-devel packages. 8 2
RHEL 7 : nettle (RHSA-2016:2582): Update the affected nettle, nettle-debuginfo and / or nettle-devel packages. 8 2
CentOS 6 : libarchive (CESA-2016:1850): Update the affected libarchive packages. 7 1
CentOS 6 : openjpeg (CESA-2017:0559): Update the affected openjpeg packages. 6 1
CentOS 6 : qemu-kvm (CESA-2017:0621): Update the affected qemu-kvm packages. 6 1
Install MS16-014 24 4
RHEL 6 / 7 : sudo (RHSA-2016:2872): Update the affected sudo, sudo-debuginfo and / or sudo-devel packages. 6 2
RHEL 7 : curl (RHSA-2016:2575): Update the affected packages. 6 2
RHEL 7 : openssh (RHSA-2016:2588): Update the affected packages. 6 2
Install MS17-017 12 6
Install MS17-011 12 6
Install MS16-153 12 6
Install MS16-124 12 6
Install MS16-123 12 6
CentOS 6 : gstreamer-plugins-good (CESA-2016:2975): Update the affected gstreamer-plugins-good packages. 5 1
Wireshark 2.0.x < 2.0.11 / 2.2.x < 2.2.5 Multiple DoS: Upgrade to Wireshark version 2.0.11 / 2.2.5 or later. 5 1
CentOS 5 / 6 : bind (CESA-2017:0063): Update the affected bind packages. 4 1
CentOS 6 : ghostscript (CESA-2017:0014): Update the affected ghostscript packages. 4 1
CentOS 6 : glibc (CESA-2017:0680): Update the affected glibc packages. Note that the updated packages may not be immediately available from the package repository and its mirrors. 4 1
CentOS 6 : gnutls (CESA-2017:0574): Update the affected gnutls packages. Note that the updated packages may not be immediately available from the package repository and its mirrors. 4 1
Install MS16-030 4 1
Install MS15-118 8 2
Install MS15-109 4 1
RHEL 7 : python (RHSA-2016:2586): Update the affected packages. 4 2
Install MS16-065 8 4
Install MS11-025 8 4
CentOS 5 / 6 / 7 : nss / nss-util (CESA-2016:2779): Update the affected nss and / or nss-util packages. 3 1
CentOS 6 : bash (CESA-2017:0725): Update the affected bash packages. Note that the updated packages may not be immediately available from the package repository and its mirrors. 3 1
CentOS 6 : mysql (CESA-2017:0184): Update the affected mysql packages. 3 1
CentOS 6 : samba4 (CESA-2017:0744): Update the affected samba4 packages. 3 1
Install MS15-132 3 1
Install MS15-084 3 1
Install MS14-072 3 1
Install MS16-115 3 3
Install MS16-087 3 3
Install MS16-080 3 3
Install MS16-076 3 3
Install MS16-075 3 3
Install MS16-061 3 3
Install MS16-048 3 3
Install MS16-047 3 3
Install MS16-044 3 3
CentOS 6 / 7 : sudo (CESA-2016:2872): Update the affected sudo packages. 2 1
CentOS 6 : gstreamer-plugins-bad-free (CESA-2016:2974): Update the affected gstreamer-plugins-bad-free packages. 2 1
CentOS 6 : samba (CESA-2017:0662): Update the affected samba packages. 2 1
Install MS16-017 2 1
Install MS15-119 2 1
Install MS15-101 4 2
RHEL 6 / 7 : expat (RHSA-2016:2824): Update the affected packages. 2 2
RHEL 6 / 7 : libgcrypt (RHSA-2016:2674): Update the affected libgcrypt, libgcrypt-debuginfo and / or libgcrypt-devel packages. 2 2
RHEL 6 / 7 : libssh2 (RHSA-2016:0428): Update the affected packages. 2 2
RHEL 6 / 7 : vim (RHSA-2016:2972): Update the affected packages. 2 2
RHEL 7 : NetworkManager (RHSA-2016:2581): Update the affected packages. 2 2
RHEL 7 : dhcp (RHSA-2016:2590): Update the affected packages. 2 2
RHEL 7 : fontconfig (RHSA-2016:2601): Update the affected packages. 2 2
RHEL 7 : glibc (RHSA-2016:2573): Update the affected packages. 2 2
RHEL 7 : libndp (RHSA-2016:1086): Update the affected libndp, libndp-debuginfo and / or libndp-devel packages. 2 2
RHEL 7 : policycoreutils (RHSA-2017:0536): Update the affected packages. 2 2
RHEL 7 : subscription-manager (RHSA-2016:2592): Update the affected packages. 2 2
RHEL 7 : systemd (RHSA-2016:2610): Update the affected packages. 2 2
RHEL 7 : util-linux (RHSA-2016:2605): Update the affected packages. 2 2
CentOS 5 / 6 : httpd (CESA-2016:1421) (httpoxy): Update the affected httpd packages. 1 1
CentOS 6 / 7 : expat (CESA-2016:2824): Update the affected expat packages. 1 1
CentOS 6 / 7 : ipa (CESA-2016:1797): Update the affected ipa packages. 1 1
CentOS 6 / 7 : libgcrypt (CESA-2016:2674): Update the affected libgcrypt packages. 1 1
CentOS 6 / 7 : policycoreutils (CESA-2016:2702): Update the affected policycoreutils packages. 1 1
CentOS 6 / 7 : python (CESA-2016:1626) (httpoxy): Update the affected python packages. 1 1
CentOS 6 : coreutils (CESA-2017:0654): Update the affected coreutils packages. 1 1
CentOS 6 : openssh (CESA-2017:0641): Update the affected openssh packages. Note that the updated packages may not be immediately available from the package repository and its mirrors. 1 1
Install MS16-021 1 1
Install MS16-020 1 1
Install MS15-135 1 1
Install MS15-102 1 1
Install MS15-090 1 1
Install MS15-082 1 1
Install MS15-060 1 1
Install MS15-051 1 1
Install MS15-041 1 1
Install MS15-006 1 1
Install MS14-053 1 1
Install MS14-031 1 1
Install MS13-090 1 1
Install MS16-071 1 1
CentOS 6 / 7 : vim (CESA-2016:2972): Update the affected vim packages. 0 1
RHEL 7 : wget (RHSA-2016:2587): Update the affected wget and / or wget-debuginfo packages. 0 2